Remove Honeypots Remove Mining Remove Passwords Remove Strategy
article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

For years identity management has relied on three factors for authentication: What one knows (passwords). However, when analyzed by new algorithmic data mining methods, big data can reveal patterns, trends, and associations that can, among other things, relate to human behavior and interactions. What one has (tokens).

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

You had to figure out how to configure Kermit, get passwords to get on. Mine was 2000. All those exercises, the honeypot or honeynet challenges I think that's what they were called in. And the strategy was just to do a good job. Hacker was more about the pursuit of knowledge. Daniel’s first Black HAt was in 1999.

IT 40